• Most Popular Usernames and Passwords

    No clue what the source is but if they are right, it is scary: DRG SSH Username and Password Authentication Tag Clouds Roger
  • Is a “Zero-Trust” Model the Silver Bullet?

    I was reading an interesting article: Forrester Pushes 'Zero Trust' Model For Security , where they mainly claim that you should not trust your internal network – something I am asking for since a long time. However, the conclusions Forrester and me are...
  • What is More Important to You? Privacy or Safety?

    I want to start upfront: I do not want to take a position here. I have an opinion as a person in my cultural context but I understand that this opinion is by far not the only one which is right or wrong. This morning I read this article: FBI Drive for...
  • Advisory for the ASP.NET Vulnerability

    We are basically asking the industry to follow a Coordinated Vulnerability Disclosure and are therefore not in favor of public vulnerability disclosure as it puts the industry unnecessarily at risk. Recently there was a vulnerability in ASP.NET publically...
  • How to Detect a Hacker Attack

    This title immediately caught my attention and probably yours as well: How to detect a hacker attack – something I definitely want to know. And then I realized that the article a) is written from a techie and b) does not really cover the attacks I am...